[QILIN] – Ransomware Victim: nrlassoc[.]com
![[QILIN] - Ransomware Victim: nrlassoc[.]com 1 image](https://www.redpacketsecurity.com/wp-content/uploads/2024/09/image.png)
Ransomware Group: QILIN
VICTIM NAME: nrlassoc[.]com
NOTE: No files or stolen information are [exfiltrated/downloaded/taken/hosted/seen/reposted/disclosed] by RedPacket Security. Any legal issues relating to the content of the files should be directed at the attackers directly, not RedPacket Security. This blog is simply posting an editorial news post informing that a company has fallen victim to a ransomware attack. RedPacket Security is in no way affiliated or aligned with any ransomware threat actors or groups and will not host infringing content. The information on this page is fully automated and redacted whilst being scraped directly from the QILIN Onion Dark Web Tor Blog page.
AI Generated Summary of the Ransomware Leak Page
On August 25, 2025, a leak page associated with the victim domain nrlassoc[.]com was published by the ransomware group Qilin. The post describes the victim as a United States-based manufacturer of machine-tooled parts and highlights a history of growth, including moving into a new 55,000 square foot state-of-the-art facility to underscore its scale. No compromise date is provided in the available data, so the post date is used as the reference date. The incident is framed as a data-leak event rather than full encryption of systems, and there is no ransom amount disclosed. A claim URL is indicated as present on the page, though the actual URL is not included in the dataset.
The leak page contains 13 image assets, presented as thumbnails, which appear to illustrate internal documents or related data. The exact contents of these images are not described in the summary. The body excerpt shows a blog-style reference to the nrlassoc[.]com domain, with contact lines and technical strings that resemble an external messaging handle and an FTP-style credential line; all personally identifiable information is redacted in this publication. The combination of image evidence and a claim URL aligns with a data-leak narrative typical of ransomware operations, with no explicit ransom figure provided in the available data.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.